First published: Fri Dec 11 2020(Updated: )
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ethernut nut/os | <=5.1 | |
Contiki OS | ||
Contiki-NG | ||
Multiple (open source) uIP (EOL), Version 1.0 and prior | ||
Open iSCSI | ||
altran picoTCP-NG | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
butok FNET | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25108 has a high severity level due to the potential for Denial-of-Service and possibly Remote Code Execution.
To fix CVE-2020-25108, update your software to versions that have addressed the DNS response data length validation issue.
CVE-2020-25108 affects several software products, including Nut/OS 5.1, uIP-Contiki-OS, uIP-Contiki-NG, and open-iscsi 2.1.12 and prior.
Due to CVE-2020-25108, an attacker can exploit the vulnerability to potentially execute a Denial-of-Service attack or Remote Code Execution.
Yes, the lack of DNS response data length checks in CVE-2020-25108 can make it easier for attackers to exploit the vulnerability.